RE: [PATCH v4] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs

2019-07-23 Thread Vakul Garg
> -Original Message- > From: Horia Geanta > Sent: Tuesday, July 23, 2019 2:38 PM > To: Vakul Garg ; linux-crypto@vger.kernel.org > Cc: Aymen Sghaier ; > herb...@gondor.apana.org.au > Subject: Re: [PATCH v4] crypto: caam/qi2 - Add printing dpseci fq stats using &

[PATCH v5] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs

2019-07-23 Thread Vakul Garg
Add support of printing the dpseci frame queue statistics using debugfs. Signed-off-by: Vakul Garg --- Changes since v4: - Corrected license header commenting style drivers/crypto/caam/Makefile | 1 + drivers/crypto/caam/caamalg_qi2.c| 5 +++ drivers/crypto/caam

[PATCH v4] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs

2019-07-23 Thread Vakul Garg
Add support of printing the dpseci frame queue statistics using debugfs. Signed-off-by: Vakul Garg --- Please ignore PATCH v3. Changes since v2: - Replaced CONFIG_CRYPTO_DEV_FSL_DPAA2_CAAM_DEBUGFS with CONFIG_DEBUG_FS. drivers/crypto/caam/Makefile | 1 + drivers

RE: [PATCH v2] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs

2019-07-22 Thread Vakul Garg
> -Original Message- > From: Horia Geanta > Sent: Monday, July 22, 2019 7:55 PM > To: Vakul Garg ; linux-crypto@vger.kernel.org > Cc: Aymen Sghaier ; > herb...@gondor.apana.org.au > Subject: Re: [PATCH v2] crypto: caam/qi2 - Add printing dpseci fq stats using > d

[PATCH v3] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs

2019-07-22 Thread Vakul Garg
Add support of printing the dpseci frame queue statistics using debugfs. Signed-off-by: Vakul Garg --- Changes v2 -> v3 - Removed CONFIG_CRYPTO_DEV_FSL_DPAA2_CAAM_DEBUGFS - Moved var 'dfs_root' out of structure 'dpaa2_caam_priv'. drivers/crypto/caa

RE: [PATCH v2] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs

2019-07-22 Thread Vakul Garg
> -Original Message- > From: Horia Geanta > Sent: Monday, July 22, 2019 7:55 PM > To: Vakul Garg ; linux-crypto@vger.kernel.org > Cc: Aymen Sghaier ; > herb...@gondor.apana.org.au > Subject: Re: [PATCH v2] crypto: caam/qi2 - Add printing dpseci fq stats using > d

[PATCH v2] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs

2019-07-19 Thread Vakul Garg
Add support of printing the dpseci frame queue statistics using debugfs. Signed-off-by: Vakul Garg --- drivers/crypto/caam/Kconfig | 11 + drivers/crypto/caam/Makefile | 1 + drivers/crypto/caam/caamalg_qi2.c| 5 +++ drivers/crypto/caam/caamalg_qi2.h| 2

[PATCH] crypto: caam/qi2 - Increase napi budget to process more caam responses

2019-07-18 Thread Vakul Garg
FQs bloat with large number of frames. In some situations, it makes kernel crash due to out-of-memory. To prevent it We increase the napi budget of dpseci driver to a big value so that caam driver is able to drain its response queues at enough rate. Signed-off-by: Vakul Garg --- drivers/crypto/c

[PATCH] crypto: caam/qi2 - Add printing dpseci fq stats using debugfs

2019-07-10 Thread Vakul Garg
Add support of printing the dpseci frame queue statistics using debugfs. Signed-off-by: Vakul Garg --- drivers/crypto/caam/caamalg_qi2.c | 95 +++ drivers/crypto/caam/caamalg_qi2.h | 3 ++ 2 files changed, 98 insertions(+) diff --git a/drivers/crypto/caam

[PATCH] crypto: caam/jr - Remove extra memory barrier during job ring dequeue

2019-04-08 Thread Vakul Garg
newly defined function wr_reg32_relaxed(). Signed-off-by: Vakul Garg --- drivers/crypto/caam/jr.c | 2 +- drivers/crypto/caam/regs.h | 8 2 files changed, 9 insertions(+), 1 deletion(-) diff --git a/drivers/crypto/caam/jr.c b/drivers/crypto/caam/jr.c index 4e9b3fca5627..2ce6d7d2ad72 1

[PATCH v3 3/3] crypto: caam/jr - Remove extra memory barrier during job ring enqueue

2019-03-21 Thread Vakul Garg
write operation. Therefore, the wmb() preceding wr_reg32() can be safely removed. Signed-off-by: Vakul Garg Reviewed-by: Horia Geanta --- drivers/crypto/caam/jr.c | 6 -- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/drivers/crypto/caam/jr.c b/drivers/crypto/caam/jr.c index

[PATCH v3 0/3] CAAM job ring driver cleanups

2019-03-21 Thread Vakul Garg
This patchset cleans up caam job ring driver. The patch series needs to be applied after merging below mentioned patch. https://www.mail-archive.com/linux-crypto@vger.kernel.org/msg37068.html Vakul Garg (3): crypto: caam/jr - Remove spinlock for output job ring crypto: caam/jr - Removed

[PATCH v3 1/3] crypto: caam/jr - Remove spinlock for output job ring

2019-03-21 Thread Vakul Garg
For each job ring pair, the output ring is processed exactly by one cpu at a time under a tasklet context (one per ring). Therefore, there is no need to protect a job ring's access & its private data structure using a lock. Hence the lock can be removed. Signed-off-by: Vakul Garg Re

[PATCH v3 2/3] crypto: caam/jr - Removed redundant vars from job ring private data

2019-03-21 Thread Vakul Garg
For each job ring, the variable 'ringsize' is initialised but never used. Similarly variables 'inp_ring_write_index' and 'head' always track the same value and instead of 'inp_ring_write_index', caam_jr_enqueue() can use 'head' itself. Both these

[PATCH v2 3/3] crypto: caam/jr - Remove extra memory barrier during job ring enqueue

2019-03-15 Thread Vakul Garg
write operation. Therefore, the wmb() preceding wr_reg32() can be safely removed. Signed-off-by: Vakul Garg --- drivers/crypto/caam/jr.c | 6 -- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/drivers/crypto/caam/jr.c b/drivers/crypto/caam/jr.c index e95f82778fa1..1de2562d0982

[PATCH v2 0/3] CAAM job ring driver cleanups

2019-03-15 Thread Vakul Garg
This patchset cleans up caam job ring driver. The patch series needs to be applied after merging below mentioned patch. https://www.mail-archive.com/linux-crypto@vger.kernel.org/msg37068.html Vakul Garg (3): crypto: caam/jr - Remove spinlock for output job ring crypto: caam/jr - Remove

[PATCH v2 1/3] crypto: caam/jr - Remove spinlock for output job ring

2019-03-15 Thread Vakul Garg
For each job ring pair, the output ring is processed exactly by one cpu at a time under a tasklet context (one per ring). Therefore, there is no need to protect a job ring's access & its private data structure using a lock. Hence the lock can be removed. Signed-off-by: Vakul Garg --

[PATCH v2 2/3] crypto: caam/jr - Removed redundant vars from job ring private data

2019-03-15 Thread Vakul Garg
For each job ring, the variable 'ringsize' is initialised but never used. Similarly variables 'inp_ring_read_index' and 'head' always track the same value and instead of 'inp_ring_read_index', caam_jr_enqueue() can use 'head' itself. Both these

[PATCH 3/3] crypto: caam/jr - Remove extra memory barrier during job ring enqueue

2019-03-14 Thread Vakul Garg
write operation. Therefore, the wmb() preceding wr_reg32() can be safely removed. Signed-off-by: Vakul Garg --- drivers/crypto/caam/jr.c | 6 -- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/drivers/crypto/caam/jr.c b/drivers/crypto/caam/jr.c index 02f02fa996da..3bd28386eb07

[PATCH 2/3] crypto: caam/jr - Remove redundant vars from job ring private data

2019-03-14 Thread Vakul Garg
For each job ring, the variable 'ringsize' is initialised but never used. Similarly variables 'inp_ring_read_index' and 'head' always track the same value and instead of 'inp_ring_read_index', caam_jr_enqueue() can use 'head' itself. Both these

[PATCH 1/3] crypto: caam/jr - Remove spinlock for output job ring

2019-03-14 Thread Vakul Garg
For each job ring pair, the output ring is processed exactly by one cpu at a time under a tasklet context (one per ring). Therefore, there is no need to protect a job ring's access & its private data structure using a lock. Hence the lock can be removed. Signed-off-by: Vakul Garg ---

[PATCH 0/3] CAAM job ring driver cleanups

2019-03-14 Thread Vakul Garg
This patchset cleans up caam job ring driver. The patch series needs to be applied after merging below mentioned patch. https://www.mail-archive.com/linux-crypto@vger.kernel.org/msg37068.html Vakul Garg (3): crypto: caam/jr - Remove spinlock for output job ring crypto: caam/jr - Remove

[PATCH v3] crypto: caam/jr - optimize job ring enqueue and dequeue operations

2019-03-05 Thread Vakul Garg
ing's occupancy registers. This eliminates need of expensive device register read operations for every job enqueued and dequeued and hence makes caam_jr_enqueue() and caam_jr_dequeue() faster. The performance of kernel ipsec improved by about 6% on ls1028 (for frame size 408 bytes). Signed-off-by:

[PATCH v2] crypto: caam/jr - optimize job ring enqueue and dequeue operations

2019-03-05 Thread Vakul Garg
ing's occupancy registers. This eliminates need of expensive device register read operations for every job enqueued and dequeued and hence makes caam_jr_enqueue() and caam_jr_dequeue() faster. Signed-off-by: Vakul Garg --- Changes since v1: - Changed 'i/p' in comment to 

RE: [PATCH] crypto: caam/jr - optimize job ring enqueue and dequeue operations

2019-03-05 Thread Vakul Garg
> -Original Message- > From: Horia Geanta > Sent: Tuesday, March 5, 2019 10:14 PM > To: Vakul Garg ; linux-crypto@vger.kernel.org > Cc: Aymen Sghaier ; > herb...@gondor.apana.org.au; da...@davemloft.net > Subject: Re: [PATCH] crypto: caam/jr - optimize job ring

[PATCH] crypto: caam/jr - optimize job ring enqueue and dequeue operations

2019-03-04 Thread Vakul Garg
ing's occupancy registers. This eliminates need of expensive device register read operations for every job enqueued and dequeued and hence makes caam_jr_enqueue() and caam_jr_dequeue() faster. Signed-off-by: Vakul Garg --- drivers/crypto/caam/intern.h | 1 + drivers/crypto/caam/jr.c | 12 +

RE: [PATCH] crypto: arm64/aes-gcm-ce - fix scatterwalk API violation

2018-08-20 Thread Vakul Garg
> -Original Message- > From: Ard Biesheuvel > Sent: Monday, August 20, 2018 8:29 PM > To: linux-crypto@vger.kernel.org > Cc: herb...@gondor.apana.org.au; Vakul Garg ; > davejwat...@fb.com; Peter Doliwa ; Ard > Biesheuvel > Subject: [PATCH] crypto: arm64/aes-

Regression in tls selftest on cortex a-53

2018-08-19 Thread Vakul Garg
Hi Ard Kernel tls selftest ' msg_more' is broken with the latest gcm changes for optimizing it on cortex a-53. (I am using David Miller's net-next branch.) Reverting following commits fixes the problem. 1. crypto: arm64/ghash-ce - implement 4-way aggregation 2. crypto: arm64/ghash-ce - replace

RE: [PATCH 1/4] crypto/arm64: ghash - reduce performance impact of NEON yield checks

2018-07-25 Thread Vakul Garg
> -Original Message- > From: bige...@linutronix.de [mailto:bige...@linutronix.de] > Sent: Wednesday, July 25, 2018 12:33 PM > To: Vakul Garg > Cc: Ard Biesheuvel ; linux- > cry...@vger.kernel.org; herb...@gondor.apana.org.au; > will.dea...@arm.com; dave.mar...@

RE: [PATCH 1/4] crypto/arm64: ghash - reduce performance impact of NEON yield checks

2018-07-24 Thread Vakul Garg
> -Original Message- > From: Ard Biesheuvel [mailto:ard.biesheu...@linaro.org] > Sent: Tuesday, July 24, 2018 10:42 PM > To: linux-crypto@vger.kernel.org > Cc: herb...@gondor.apana.org.au; will.dea...@arm.com; > dave.mar...@arm.com; Vakul Garg ; > bige...@linutron

RE: [PATCH v5 00/23] crypto: arm64 - play nice with CONFIG_PREEMPT

2018-03-10 Thread Vakul Garg
Hi How does this patchset affect the throughput performance of crypto? Is it expected to increase? Regards Vakul > -Original Message- > From: linux-crypto-ow...@vger.kernel.org [mailto:linux-crypto- > ow...@vger.kernel.org] On Behalf Of Ard Biesheuvel > Sent: Saturday, March 10, 2018 8:

RE: [PATCH v9 crypto 00/12] Chelsio Inline TLS

2018-03-06 Thread Vakul Garg
> -Original Message- > From: linux-crypto-ow...@vger.kernel.org [mailto:linux-crypto- > ow...@vger.kernel.org] On Behalf Of Atul Gupta > Sent: Tuesday, March 6, 2018 9:05 PM > To: davejwat...@fb.com; da...@davemloft.net; > herb...@gondor.apana.org.au > Cc: linux-crypto@vger.kernel.org; ne

RE: [RFC crypto v3 8/9] chtls: Register the ULP

2018-02-08 Thread Vakul Garg
> -Original Message- > From: linux-crypto-ow...@vger.kernel.org [mailto:linux-crypto- > ow...@vger.kernel.org] On Behalf Of Atul Gupta > Sent: Thursday, February 8, 2018 3:56 PM > To: Dave Watson > Cc: s...@queasysnail.net; herb...@gondor.apana.org.au; linux- > cry...@vger.kernel.org; ga

RE: [PATCHv2] tls: Add support for encryption using async offload accelerator

2018-01-31 Thread Vakul Garg
> -Original Message- > From: Dave Watson [mailto:davejwat...@fb.com] > Sent: Wednesday, January 31, 2018 11:05 PM > To: Vakul Garg > Cc: linux-crypto@vger.kernel.org; il...@mellanox.com; > avia...@mellanox.com; da...@davemloft.net; net...@vger.kernel.org; > Gilad

RE: [PATCHv2] tls: Add support for encryption using async offload accelerator

2018-01-31 Thread Vakul Garg
> -Original Message- > From: Dave Watson [mailto:davejwat...@fb.com] > Sent: Wednesday, January 31, 2018 8:52 PM > To: Vakul Garg > Cc: linux-crypto@vger.kernel.org; il...@mellanox.com; > avia...@mellanox.com; da...@davemloft.net; net...@vger.kernel.org; > Gilad

[PATCHv2] tls: Add support for encryption using async offload accelerator

2018-01-31 Thread Vakul Garg
. Signed-off-by: Vakul Garg --- v1-v2: - Used crypto_wait_req() to wait for async operation completion - Passed CRYPTO_TFM_REQ_MAY_BACKLOG to crypto_aead_encrypt include/net/tls.h | 2 ++ net/tls/tls_sw.c | 8 +++- 2 files changed, 9 insertions(+), 1 deletion(-) diff --git a/include/net/tls.h b

RE: [PATCH] tls: Add support for encryption using async offload accelerator

2018-01-31 Thread Vakul Garg
Forgot to add 'v2' in subject line. I will be resending. -Original Message----- From: Vakul Garg Sent: Wednesday, January 31, 2018 9:29 PM To: linux-crypto@vger.kernel.org Cc: il...@mellanox.com; avia...@mellanox.com; davejwat...@fb.com; da...@davemloft.net; net...@vger.kernel.

[PATCH] tls: Add support for encryption using async offload accelerator

2018-01-31 Thread Vakul Garg
. Signed-off-by: Vakul Garg --- v1-v2: - Used crypto_wait_req() to wait for async operation completion - Passed CRYPTO_TFM_REQ_MAY_BACKLOG to crypto_aead_encrypt include/net/tls.h | 2 ++ net/tls/tls_sw.c | 8 +++- 2 files changed, 9 insertions(+), 1 deletion(-) diff --git a/include/net/tls.h b

[PATCH] tls: Add support for encryption using async offload accelerator

2018-01-31 Thread Vakul Garg
. Signed-off-by: Vakul Garg --- net/tls/tls_sw.c | 22 ++ 1 file changed, 22 insertions(+) diff --git a/net/tls/tls_sw.c b/net/tls/tls_sw.c index 73d19210dd49..390e6dc7b135 100644 --- a/net/tls/tls_sw.c +++ b/net/tls/tls_sw.c @@ -39,6 +39,11 @@ #include +struct

[PATCH] tls: Add support for encryption using async offload accelerator

2018-01-30 Thread Vakul Garg
. Signed-off-by: Vakul Garg --- net/tls/tls_sw.c | 22 ++ 1 file changed, 22 insertions(+) diff --git a/net/tls/tls_sw.c b/net/tls/tls_sw.c index 73d19210dd49..390e6dc7b135 100644 --- a/net/tls/tls_sw.c +++ b/net/tls/tls_sw.c @@ -39,6 +39,11 @@ #include +struct

RE: [PATCH] crypto: caam - fix memleak in caam_jr module

2014-07-03 Thread Vakul Garg
This patch fixes a memory leak that appears when caam_jr module is unloaded. Cc: # 3.13+ Signed-off-by: Cristian Stoica --- drivers/crypto/caam/jr.c | 1 + 1 file changed, 1 insertion(+) diff --git a/drivers/crypto/caam/jr.c b/drivers/crypto/caam/jr.c index 1d80bd3..f127f86 100644 --- a/driver

RE: [PATCH] crypto: caam - Fix key inlining in AEAD shared descriptors

2014-05-05 Thread Vakul Garg
> Sent: Saturday, May 03, 2014 5:40 AM > > > > > > On Sun, 27 Apr 2014 11:26:14 -0400 > > > Vakul Garg wrote: > > > > > > > @@ -220,6 +220,8 @@ static int aead_null_set_sh_desc(struct > > > > crypto_aead > > > *aead) &g

RE: [PATCH] crypto: caam - Fix key inlining in AEAD shared descriptors

2014-05-03 Thread Vakul Garg
u Alexandru-B06830 > Subject: Re: [PATCH] crypto: caam - Fix key inlining in AEAD shared > descriptors > > On Sun, 27 Apr 2014 11:26:14 -0400 > Vakul Garg wrote: > > > The variable 'keys_fit_inline' is initialised correctly to avoid using > > its stale

[PATCH] crypto: caam - Fix key inlining in AEAD shared descriptors

2014-04-26 Thread Vakul Garg
The variable 'keys_fit_inline' is initialised correctly to avoid using its stale value while creating shared descriptor for decryption and given-iv-encryption. Signed-off-by: Vakul Garg --- drivers/crypto/caam/caamalg.c | 15 +-- 1 file changed, 13 insertions(+), 2

[PATCH][RESEND] crypto: caam - Moved macro DESC_JOB_IO_LEN to desc_constr.h

2013-07-09 Thread Vakul Garg
: Ic8900990d465e9079827b0c7fcacc61766d7efb6 Signed-off-by: Vakul Garg Reviewed-by: Geanta Neag Horia Ioan-B05471 Reviewed-by: Fleming Andrew-AFLEMING Tested-by: Fleming Andrew-AFLEMING --- drivers/crypto/caam/caamalg.c |2 -- drivers/crypto/caam/caamhash.c|2 -- drivers/crypto/caam

[PATCH][RESEND] crypto: caam - Fixed the memory out of bound overwrite issue

2013-07-09 Thread Vakul Garg
-32: Restoring 0xdec5dec0-0xdec5dec3=0xcc Change-Id: I0c7a1048053e811025d1c3b487940f87345c8f5d Signed-off-by: Vakul Garg CC: #3.9 Reviewed-by: Geanta Neag Horia Ioan-B05471 Reviewed-by: Fleming Andrew-AFLEMING Tested-by: Fleming Andrew-AFLEMING --- drivers/crypto/caam/caamhash.c |2 +- 1

[PATCH] crypto: caam - Moved macro DESC_JOB_IO_LEN to desc_constr.h

2013-05-30 Thread Vakul Garg
: Ic8900990d465e9079827b0c7fcacc61766d7efb6 Signed-off-by: Vakul Garg Reviewed-by: Geanta Neag Horia Ioan-B05471 Reviewed-by: Fleming Andrew-AFLEMING Tested-by: Fleming Andrew-AFLEMING --- drivers/crypto/caam/caamalg.c |2 -- drivers/crypto/caam/caamhash.c|2 -- drivers/crypto/caam

[PATCH] crypto: caam - Fixed the memory out of bound overwrite issue

2013-05-30 Thread Vakul Garg
-32: Restoring 0xdec5dec0-0xdec5dec3=0xcc Change-Id: I0c7a1048053e811025d1c3b487940f87345c8f5d Signed-off-by: Vakul Garg CC: #3.9 Reviewed-by: Geanta Neag Horia Ioan-B05471 Reviewed-by: Fleming Andrew-AFLEMING Tested-by: Fleming Andrew-AFLEMING --- drivers/crypto/caam/caamhash.c |2 +- 1

Re: Fwd: crypto accelerator driver problems

2013-04-24 Thread Vakul Garg
Herbert Xu gondor.apana.org.au> writes: > > On Wed, Jan 26, 2011 at 10:26:33AM +0330, Hamid Nassiby wrote: > > > > As you know, I posted my problem again to crypto list and no one answered. > > Now I > > emphasize one aspect of the problem as a concept related to IPSec protocol, > > free > > o

[PATCHv1] crypto: caam - fix job ring cleanup code

2013-04-14 Thread Vakul Garg
[c029fb38] __device_release_driver+0x68/0x120 [eac47e90] [c02a05c8] driver_detach+0xd8/0xe0 [eac47eb0] [c029f8e0] bus_remove_driver+0xa0/0x110 [eac47ed0] [c00768e4] sys_delete_module+0x144/0x270 [eac47f40] [c000e2f0] ret_from_syscall+0x0/0x3c Signed-off-by: Vakul Garg Signed-off-by: Bharat Bhushan -

[PATCH][REPOST] crypto: caam - Fix missing init of '.type' in AEAD algos.

2013-03-12 Thread Vakul Garg
4),cbc(des)) (f) authenc(hmac(sha384),cbc(des)) Signed-off-by: Vakul Garg Reviewed-by: Kim Phillips Signed-off-by: Andy Fleming --- drivers/crypto/caam/caamalg.c |6 ++ 1 files changed, 6 insertions(+), 0 deletions(-) diff --git a/drivers/crypto/caam/caamalg.c b/drivers/crypto/caam

[PATCHv1] crypto: caam - set RDB bit in security configuration register

2013-03-12 Thread Vakul Garg
st. If the Random Data Buffer is not enabled, then each IV causes a separate request, and RNG4 hardware cannot keep up resulting in lower IPSEC throughput if random IVs are used. Signed-off-by: Vakul Garg --- Sorry for repeated sending. Resending as suggested by Herbert. Changes in v1: Addressed Ki

[PATCHv1] crypto: caam - set RDB bit in security configuration register

2013-03-11 Thread Vakul Garg
st. If the Random Data Buffer is not enabled, then each IV causes a separate request, and RNG4 hardware cannot keep up resulting in lower IPSEC throughput if random IVs are used. Signed-off-by: Vakul Garg --- Changes in v1: Addressed Kim Philip's comments. (a) Limit commit message to 75 characters

[PATCHv1] crypto: caam - set RDB bit in security configuration register

2013-03-11 Thread Vakul Garg
st. If the Random Data Buffer is not enabled, then each IV causes a separate request, and RNG4 hardware cannot keep up resulting in lower IPSEC throughput if random IVs are used. Signed-off-by: Vakul Garg --- Changes in v1: Addressed Kim Philip's comments. (a) Limit commit message to 75 characters

[PATCHv1] crypto: caam - set RDB bit in security configuration register

2013-02-06 Thread Vakul Garg
st. If the Random Data Buffer is not enabled, then each IV causes a separate request, and RNG4 hardware cannot keep up resulting in lower IPSEC throughput if random IVs are used. Signed-off-by: Vakul Garg --- drivers/crypto/caam/ctrl.c |3 +++ drivers/crypto/caam/regs.h |4 +++- 2 files

[PATCH] crypto: caam - set RDB bit in security configuration register

2013-02-06 Thread Vakul Garg
st. If the Random Data Buffer is not enabled, then each IV causes a separate request, and RNG4 hardware cannot keep up resulting in lower IPSEC throughput. Signed-off-by: Vakul Garg --- drivers/crypto/caam/ctrl.c |3 +++ drivers/crypto/caam/regs.h |4 +++- 2 files changed, 6 insertions(+), 1

[PATCHv2] crypto: caam - Added property fsl,sec-era in SEC4.0 device tree binding.

2013-01-23 Thread Vakul Garg
This new property defines the era of the particular SEC version. The compatible property in device tree "crypto" node has been updated not to contain SEC era numbers. Signed-off-by: Vakul Garg --- Changes in v1: 1. Marked fsl,sec-era as 'optional'. Changes in v2:

[PATCHv1] crypto: caam - Added property fsl,sec-era in SEC4.0 device tree binding.

2013-01-22 Thread Vakul Garg
This new property defines the era of the particular SEC version. The compatible property in device tree "crypto" node has been updated not to contain SEC era numbers. Signed-off-by: Vakul Garg --- Changelog: 1. Marked fsl,sec-era as 'optional'. .../devicetree/bind

[PATCH] crypto: caam - Added property fsl,sec-era in SEC4.0 device tree binding.

2013-01-22 Thread Vakul Garg
This new property defines the era of the particular SEC version. The compatible property in device tree "crypto" node has been updated not to contain SEC era numbers. Signed-off-by: Vakul Garg --- .../devicetree/bindings/crypto/fsl-sec4.txt| 12 +--- 1 files

[PATCH] crypto: tcrypt - removed unused variable.

2013-01-15 Thread Vakul Garg
() already sets output buffer in the ahash transform using ahash_request_set_crypt(). Signed-off-by: Vakul Garg --- crypto/tcrypt.c | 17 - 1 files changed, 8 insertions(+), 9 deletions(-) diff --git a/crypto/tcrypt.c b/crypto/tcrypt.c index 7ae2130..1414b9f 100644 --- a/crypto

[PATCH 2/2] crypto: caam - improve init for context state saves

2013-01-11 Thread Vakul Garg
From: Steve Cornelius Multiple function in asynchronous hashing use a saved-state block, a.k.a. struct caam_hash_state, which holds a stash of information between requests (init/update/final). Certain values in this state block are loaded for processing using an inline-if, and when this is done,

[PATCH 0/2] crypto: caam - Fix bugs in hashing module

2013-01-11 Thread Vakul Garg
These patches have been authored by Steve Cornelius. These patches fix uninitialised variables left in the hashing module. . Steve Cornelius (2): crypto: caam - Fix DMA size in descriptor in ahash_digest() crypto: caam - improve init for context state saves drivers/crypto/caam/caamhash.c |

[PATCH 1/2] crypto: caam - Fix DMA size in descriptor in ahash_digest()

2013-01-11 Thread Vakul Garg
From: Steve Cornelius Save of DMA size in extended descriptor was missing. Thus crashes could occur during post-request unmapping. Signed-off-by: Steve Cornelius --- drivers/crypto/caam/caamhash.c |1 + 1 files changed, 1 insertions(+), 0 deletions(-) diff --git a/drivers/crypto/caam/caam

[PATCH] crypto: caam - fix job ring cleanup code

2013-01-10 Thread Vakul Garg
, unbound and then bound again to caam platform driver. Signed-off-by: Vakul Garg Signed-off-by: Bharat Bhushan --- drivers/crypto/caam/intern.h |1 + drivers/crypto/caam/jr.c |4 2 files changed, 5 insertions(+), 0 deletions(-) diff --git a/drivers/crypto/caam/intern.h b/drivers

[PATCH] crypto: tcrypt - Ahash tests changed to run in parallel.

2013-01-09 Thread Vakul Garg
This allows to test & run multiple parallel crypto ahash contexts. Each of the test vector under the ahash speed test template is started under a separate kthread. Signed-off-by: Vakul Garg --- crypto/tcrypt.c | 164 +++ 1 files changed,

[PATCH] crypto: testmgr - add aead cbc des, des3_ede tests.

2013-01-08 Thread Vakul Garg
"authenc(hmac(sha384),cbc(des3_ede))" (i) "authenc(hmac(sha512),cbc(des))" (j) "authenc(hmac(sha512),cbc(des3_ede))" Signed-off-by: Vakul Garg --- crypto/testmgr.c | 120 ++ crypto/testmgr.h | 647 +++

[PATCH] crypto: testmgr - add aead cbc aes hmac sha384 test vectors

2013-01-07 Thread Vakul Garg
Test vectors were generated starting from existing CBC(AES) test vectors (RFC3602, NIST SP800-38A) and adding HMAC(SHA384) computed with Crypto++ and double-checked with HashCalc. Signed-off-by: Vakul Garg --- crypto/testmgr.c | 12 ++ crypto/testmgr.h | 293

[PATCH] crypto: caam - Fix missing init of '.type' in AEAD algos.

2013-01-07 Thread Vakul Garg
4),cbc(des)) (f) authenc(hmac(sha384),cbc(des)) Signed-off-by: Vakul Garg --- drivers/crypto/caam/caamalg.c |6 ++ 1 files changed, 6 insertions(+), 0 deletions(-) diff --git a/drivers/crypto/caam/caamalg.c b/drivers/crypto/caam/caamalg.c index b2a0a07..42420fb 100644 --- a/drivers/c

[PATCH][RFC] crypto: tcrypt - Ahash tests changed to run in parallel.

2013-01-02 Thread Vakul Garg
This allows to test & run multiple parallel crypto ahash contexts. Each of the test vector under the ahash speed test template is started under a separate kthread. Signed-off-by: Vakul Garg --- crypto/tcrypt.c | 164 +++ 1 files changed,

[PATCH] Revert "crypto: caam - Updated SEC-4.0 device tree binding for ERA information."

2012-12-07 Thread Vakul Garg
This reverts commit a2c0911c09190125f52c9941b9d187f601c2f7be. Signed-off-by: Vakul Garg --- Instead of adding SEC era information in crypto node's compatible, a new property 'fsl,sec-era' is being introduced into crypto node. .../devicetree/bindings/crypto/fsl-sec4.txt

[PATCHv2] crypto: caam - Updated SEC-4.0 device tree binding for ERA information.

2012-11-30 Thread Vakul Garg
The compatible property in device tree "crypto" node has been enhanced to provide SEC ERA information to the applications. Signed-off-by: Vakul Garg --- .../devicetree/bindings/crypto/fsl-sec4.txt|5 +++-- 1 files changed, 3 insertions(+), 2 deletions(-) diff --git a/Doc

[PATCHv2] crypto:caam - Improved support of CAAM era retrieval.

2012-09-19 Thread Vakul Garg
. For ERA-6 and later devices, it returns ERA directly by reading CCBVID. Signed-off-by: Vakul Garg --- drivers/crypto/caam/ctrl.c | 29 + drivers/crypto/caam/ctrl.h |2 +- drivers/crypto/caam/regs.h |7 +++ 3 files changed, 29 insertions(+), 9 deletions

[PATCH] crypto:caam - Improved support of CAAM era retrieval.

2012-09-19 Thread Vakul Garg
the mapping table. For ERA-6 and later devices, it returns ERA directly by reading CCBVID. Signed-off-by: Vakul Garg --- drivers/crypto/caam/ctrl.c | 33 +++-- drivers/crypto/caam/ctrl.h |2 +- drivers/crypto/caam/regs.h |7 +++ 3 files changed, 31

[PATCHv1] crypto-caam: added entry for P5040 in SEC-VID to SEC-ERA mapping table.

2012-09-17 Thread Vakul Garg
On P5040, SEC-ERA does not print correctly. This is because SEC-VID to SEC-ERA mapping table does not contain information for P5040. This patch adds this information. Signed-off-by: Vakul Garg --- Please ignore my previous patch which contained internal release prefixes. drivers/crypto/caam

[PATCH][1.3][SEC] Added entry for P5040 in SEC-VID to SEC-ERA mapping table.

2012-09-17 Thread Vakul Garg
On P5040, SEC-ERA does not print correctly. This is because SEC-VID to SEC-ERA mapping table does not contain information for P5040. This patch adds this information. Signed-off-by: Vakul Garg --- drivers/crypto/caam/ctrl.c |3 ++- 1 files changed, 2 insertions(+), 1 deletions(-) diff